No description
-
2011 (v1)PublicationUploaded on: March 27, 2023
-
2011 (v1)Publication
No description
Uploaded on: March 27, 2023 -
2012 (v1)Publication
No description
Uploaded on: April 14, 2023 -
May 11, 2020 (v1)Publication
Fonte inestimabile di diversità marina (animale e vegetale), il coralligeno, è considerato insieme alle praterie di Posidonia oceanica, il principale hot spot di biodiversità di tutto il bacino del Mar Mediterraneo. Essendo "costruito" tramite la stratificazione nel tempo di talli algali (calcarei), sedimenti e scheletri animali, il coralligeno...
Uploaded on: April 14, 2023 -
2013 (v1)Publication
No description
Uploaded on: April 14, 2023 -
2010 (v1)Publication
No description
Uploaded on: March 27, 2023 -
2014 (v1)Publication
No description
Uploaded on: March 27, 2023 -
2012 (v1)Publication
No description
Uploaded on: March 27, 2023 -
2015 (v1)Publication
The tremendous success of the mobile application paradigm is due to the ease with which new applications are uploaded by developers, distributed through the application markets (e.g. Google Play), and finally installed by the users. Yet, the very same model is causing serious security concerns, since users have no or little means to ascertain...
Uploaded on: April 14, 2023 -
2015 (v1)Publication
The Android Security Framework controls the executions of applications through permissions which are statically granted by the user during installation. However, the definition of security policies over permissions is not supported. Security policies must be therefore manually encoded into the application by the developer, which is a dangerous...
Uploaded on: April 14, 2023 -
2014 (v1)Publication
No description
Uploaded on: March 27, 2023 -
2014 (v1)Publication
The emerging Bring Your Own Device (BYOD) paradigm is pushing the adoption of employees' personal mobile devices (e.g., smartphones and tablets) inside organizations for professional usage. However, allowing private, general purpose devices to interact with proprietary, possibly critical infrastructures enables obvious threats. Unfortunately,...
Uploaded on: April 14, 2023 -
2013 (v1)Publication
No description
Uploaded on: April 14, 2023 -
2018 (v1)Publication
The swift and continuous evolution of mobile devices is encouraging both private and public organizations to adopt the Bring Your Own Device (BYOD) paradigm. As a matter of fact, the BYOD paradigm drastically reduces costs and increases productivity by allowing employees to carry out business tasks on their personal devices. However, it also...
Uploaded on: April 14, 2023 -
2012 (v1)Publication
No description
Uploaded on: April 14, 2023 -
2014 (v1)Publication
No description
Uploaded on: March 27, 2023 -
2016 (v1)Publication
Android has a layered architecture that allows applications to leverage services provided by the underlying Linux kernel. However, Android does not prevent applications from directly triggering the kernel functionalities through system call invocations. As recently shown in the literature, this feature can be abused by malicious applications...
Uploaded on: April 14, 2023